Skip to main content

previous disabled Page of 5
and
  1. No Access

    Article

    EMPSI: Efficient multiparty private set intersection (with cardinality)

    Multiparty private set intersection (PSI) allows several parties, each holding a set of elements, to jointly compute the intersection without leaking any additional information. With the development of cloud c...

    Yunbo Yang, **aolei Dong, Zhenfu Cao, Jiachen Shen in Frontiers of Computer Science (2023)

  2. No Access

    Article

    IXT: Improved searchable encryption for multi-word queries based on PSI

    Oblivious Cross-Tags (OXT) [1] is the first efficient searchable encryption (SE) protocol for conjunctive queries in a single-writer single-reader framework. However, it also has a trade-off between security and ...

    Yunbo Yang, **aolei Dong, Zhenfu Cao, Jiachen Shen in Frontiers of Computer Science (2023)

  3. No Access

    Chapter and Conference Paper

    Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations

    This work studies the key-alternating ciphers (KACs) whose round permutations are not necessarily independent. We revisit existing security proofs for key-alternating ciphers with a single permutation (KACSPs), a...

    Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, **aolei Dong in Theory of Cryptography (2023)

  4. No Access

    Chapter and Conference Paper

    MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption

    Existing multi-user dynamic symmetric searchable encryptions (DSSE) schemes unreasonably require private key sharing or require data owners to stay online. And existing verifiable DSSE is mostly based on publi...

    **yang Li, Zhenfu Cao, Jiachen Shen, **aolei Dong in Science of Cyber Security (2023)

  5. No Access

    Chapter and Conference Paper

    SVFL: Secure Vertical Federated Learning on Linear Models

    Federated learning (FL) is a popular technique that enables multiple parties to train a machine learning model collaboratively without disclosing the raw data to each other. A vertically partitioned federated ...

    Kaifeng Luo, Zhenfu Cao, Jiachen Shen, **aolei Dong in Science of Cyber Security (2023)

  6. No Access

    Chapter and Conference Paper

    Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning

    As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...

    Zhen **a, Zhenfu Cao, Jiachen Shen in Information Security Practice and Experien… (2023)

  7. No Access

    Article

    A survey on cryptographic techniques for protecting big data security: present and forthcoming

    Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they significantly create economic and social value, big data meaningfull...

    Siqi Lu, Jianhua Zheng, Zhenfu Cao, Yongjuan Wang in Science China Information Sciences (2022)

  8. No Access

    Chapter and Conference Paper

    Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

    Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over the...

    **ngkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang in Computer Security – ESORICS 2022 (2022)

  9. No Access

    Article

    A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid

    Incorporation of fog computing with low latency, preprocession (e.g., data aggregation) and location awareness, can facilitate fine-grained collection of smart metering data in smart grid and promotes the sust...

    Zhusen Liu, Zhenfu Cao, **aolei Dong, **aopeng Zhao in Frontiers of Computer Science (2021)

  10. No Access

    Article

    Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity

    At PKC 2019, Clear and McGoldrick presented the first identity-based encryption (IBE) scheme that is group homomorphic for addition modulo a poly-sized prime e. Assuming that deciding solvability of a special sys...

    **aopeng Zhao, Zhenfu Cao, **aolei Dong, Jun Shao in Designs, Codes and Cryptography (2021)

  11. Chapter and Conference Paper

    Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation

    The tight security bound of the KAC (Key-Alternating Cipher) construction whose round permutations are independent from each other has been well studied. Then a natural question is how the security bound will ...

    Yusai Wu, Liqing Yu, Zhenfu Cao, **aolei Dong in Advances in Cryptology – ASIACRYPT 2020 (2020)

  12. No Access

    Chapter and Conference Paper

    New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol

    The e-th power residue symbol \(\left( \frac{\alpha }{\mathfrak {p}}\right) _e\) is a useful mathematical tool in cry...

    **aopeng Zhao, Zhenfu Cao, **aolei Dong, Jun Shao in Information Security and Privacy (2020)

  13. No Access

    Chapter and Conference Paper

    Anonymous IBE from Quadratic Residuosity with Fast Encryption

    We develop two variants of Cocks’ identity-based encryption. One variant has faster encryption, where the most time-consuming part only requires several modular multiplications. The other variant makes the fir...

    **aopeng Zhao, Zhenfu Cao, **aolei Dong, **wen Zheng in Information Security (2020)

  14. No Access

    Article

    Secure key-aggregation authorized searchable encryption

    Haijiang Wang, **aolei Dong, Zhenfu Cao, Dongmei Li in Science China Information Sciences (2019)

  15. No Access

    Chapter and Conference Paper

    Efficient Collision Attack Frameworks for RIPEMD-160

    RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256. Due to the complex dual-stream structure, the first collision attack on reduced RIPEMD-160 presented by Liu,...

    Fukang Liu, Christoph Dobraunig, Florian Mendel in Advances in Cryptology – CRYPTO 2019 (2019)

  16. Chapter and Conference Paper

    SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks

    A number of searchable encryption schemes have been widely proposed to solve the search problem in ciphertext domain. However, most existing searchable encryption schemes are vulnerable to keyword guessing at...

    Hongyuan Chen, Zhenfu Cao, **aolei Dong, Jiachen Shen in Trust Management XIII (2019)

  17. No Access

    Chapter and Conference Paper

    DMU-ABSE: Dynamic Multi-user Attribute-Based Searchable Encryption with File Deletion and User Revocation

    Searchable encryption (SE) is a new cryptographic technique that allows data users searching for the files of their interests over huge amounts of encrypted files on the cloud. When it comes to multi-user sett...

    Jiming Liu, Zhenfu Cao, **aolei Dong in Security and Privacy in Social Networks an… (2019)

  18. No Access

    Chapter and Conference Paper

    Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm

    In this paper, we introduce an alternative method to find ordinary cube variables for Keccak-MAC by making full use of the key-independent bit conditions. First, we select some potential candidates for ordinar...

    Fukang Liu, Zhenfu Cao, Gaoli Wang in Advances in Information and Computer Security (2019)

  19. No Access

    Article

    Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation

    Along with the prevalence of cloud computing, it can be realised to efficiently outsource costly storage or computations to cloud servers. Recently, secure outsourcing mechanism has received more and more atte...

    Dongmei Li, **aolei Dong, Zhenfu Cao, Haijiang Wang in Science China Information Sciences (2018)

  20. Chapter and Conference Paper

    Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation

    Ciphertext-policy attribute-based encryption (CP-ABE) is a promising primitive for enforcing access control policies defined by data owner on outsourced data. We propose a novel primitive called server-aided d...

    Gang Yu, **aoxiao Ma, Zhenfu Cao, Weihua Zhu in Information and Communications Security (2018)

previous disabled Page of 5